Revision Date: | 2020-11-19 | Version: | 1 |
Title: | Security update for tor (Important) |
Description: |
This update for tor fixes the following issues:
Updating tor to a newer version in the respective codestream.
- tor 0.3.5.12: * Check channels+circuits on relays more thoroughly (TROVE-2020-005, boo#1178741) * Not affected by out-of-bound memory access (CVE-2020-15572, boo#1173979) * Fix DoS defenses on bridges with a pluggable transport * CVE-2020-10592: CPU consumption DoS and timing patterns (boo#1167013) * CVE-2020-10593: circuit padding memory leak (boo#1167014)
* - tor 0.4.4.6 * Check channels+circuits on relays more thoroughly (TROVE-2020-005, boo#1178741) * Fix a crash due to an out-of-bound memory access (CVE-2020-15572, boo#1173979) * Fix logrotate to not fail when tor is stopped (boo#1164275)
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1164275 1167013 1167014 1173979 1178741 CVE-2020-10592 CVE-2020-10593 CVE-2020-15572 openSUSE-SU-2020:1970-1
|
Platform(s): | SUSE Linux Enterprise High Performance Computing 15 SP2 SUSE Linux Enterprise Server 15 SP2 SUSE Linux Enterprise Server for SAP Applications 15 SP2 SUSE Linux Enterprise Storage 7 SUSE Manager Proxy 4.1 SUSE Manager Server 4.1 SUSE Package Hub for SUSE Linux Enterprise 15 SP2
| Product(s): | |
Definition Synopsis |
SUSE Package Hub for SUSE Linux Enterprise 15 SP2 is installed AND tor-0.4.4.6-bp152.2.3.1 is installed
|